Browse Items (11810 total)
Sort by:
-
PEDOT decorated with PTIR nanoclusters on carbon fiber paper toward electrocatalytic reduction of a hypertensive drug olmesartan medoxomil
A facile electrochemical sensor was developed by electrochemical deposition of PtIr nanoparticles on poly(3,4ethylenedioxythiophene) (PEDOT) modified carbon fiber paper electrode (CFP). The modified electrodes were characterized by Field emission scanning electron microscopy (FESEM) with energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), RAMAN spectroscopy, Fourier transform infrared spectroscopy (FTIR) and electroanalytical techniques. PtIr-PEDOT modified CFP electrode was used successfully in the determination of an anti-hypertensive prodrug Olmesartan medoxomil (OM) at femtomolar (fM) level for the first time. Under optimal conditions, the prepared electrochemical sensor has shown broad linear range between 0.001 pM and 0.220 pM and superior detection limit of 3.42 fM was observed based on Differential pulse voltammetric (DPV) study. In addition, the designed electrochemical sensor was successfully demonstrated as a novel platform in the electrochemical determination of OM in human urine and pharmaceutical samples. 2018 The Electrochemical Society. -
Cross diffusion effects on magnetohydrodynamic slip flow of Carreau liquid over a slendering sheet with non-uniform heat source/sink
Magnetohydrodynamic flow of Carreau fluid over a slendering sheet (variable thickness) has been numerically studied by considering the multiple slips effect. Thermosolutal boundary layer analysis is also accounted in the presence of cross diffusion and non-uniform heat source/sink. The governing nonlinear coupled partial differential equations are transformed to nonlinear coupled ordinary differential equations before being integrated numerically using RungeKutta based Newtons schemes. The effects of various parameters involved in the present problem were elaborately discussed with help of graphs and tables. The present results in a limiting sense are found to accord with the previous study. The present results indicate that the cross diffusion and slip parameters had a tendency to control the flow. The influence of slip is more evident in Carreau fluid case on contrast with the Newtonian fluid case. 2018, The Brazilian Society of Mechanical Sciences and Engineering. -
Design of a square-shaped broadband antenna with ground slots for bandwidth improvement
This paper portrays the design of a compact square-shaped microstrip broadband antenna using ground slots. Polygon shaped slots are placed on the ground under the feed line for bandwidth improvement. Similarly, rectangular slots are placed on the square patch for gain enhancement. Effect of these slots on the performance of the antenna in terms of impedance bandwidth, gain and directivity are studied. Results of simulation tests show that a ground slot with proper dimensions placed under the feed line can improve the impedance matching and hence increase the bandwidth without affecting much the performance of the antenna. This compact antenna of size 9.098 x 9.098 mm can be very useful for applications where size is a major constraint. Simple microstrip feed is used to feed the patch. The percentage bandwidth of this antenna is 75.57 %. 2018 Authors. -
An approach to finding customer-value and devising marketing strategies by using data-mining techniques
The digital marketing space is an outcome of the advent of digital age and the booming network technology. The earlier methods of marketing have almost been eclipsed with this digital marketing, which could include any material, information, videos on the internet and social media, etc. The marked distinction between a digital and traditional marketing is that the former uses digital devices in the traditional space. People today consume innumerable products daily and getting to know the customer's interests, their transaction's history, identifying a loyal customer and estimating their lifetime value are all at the very heart of digital marketing. It is here, in this context, that data mining techniques play a key role. This unique blending of data mining techniques with digital marketing will help merchants increase their sales and revenue exponentially. This research paper explores the possibility of finding the frequent item-set generated by a customer while making purchases, tracking their loyalty based on the number of purchases and their frequency and thereafter devising an appropriate marketing strategy for that particular product type. It is the analysis of the product based on the previous marketing experiences of the consumer. This system will boost a merchant's businesses by identifying their loyal customers (customer segmentation), best sold products (product recommendation) and reveal the different marketing strategies that can be adopted by them to reach out to their potential customers and thus increase their sales (Strategy selection/combination). IAEME Publication. -
Service request scheduling based on quantification principle using conjoint analysis and Z-score in cloud
Service request scheduling has a major impact on the performance of the service processing design in a large-scale distributed computing environment like cloud systems. It is desirable to have a service request scheduling principle that evenly distributes the workload among the servers, according to their capacities. The capacities of the servers are termed high or low relative to one another. Therefore, there is a need to quantify the server capacity to overcome this subjective assessment. Subsequently, a method to split and distribute the service requests based on this quantified server capacity is also needed. The novelty of this research paper is to address these requirements by devising a service request scheduling principle for a heterogeneous distributed system using appropriate statistical methods, namely Conjoint analysis and Z-score. Suitable experiments were conducted and the experimental results show considerable improvement in the performance of the designed service request scheduling principle compared to a few other existing principles. Areas of further improvement have also been identified and presented. Copyright 2018 Institute of Advanced Engineering and Science. All rights reserved. -
Data encryption and decryption using graph plotting
Cryptography plays a vital role in today's network. Security of data is one of the biggest concern while exchanging data over the network. The data need to be highly confidential. Cryptography is the art of hiding data or manipulating data in such a way that where no third party can understand the original data while transmission from source to destination. In this paper, a modified affine cipher algorithm has been used to encrypt the data. The encrypted data will be plot onto a graph. Later, graph will be converted into image. This system allows sender to select his/her own keys to encrypt the original data before plotting graph. Then, Receiver will use the same key to decrypt the data. This system will provide the better security while storing the data in cloud in the form of secret message embedding in graphical image file in network environment. IAEME Publication. -
Securing iot networks using an onion routing based approach
Internet of Things (IoT) comprises of small, connected, power-efficient devices with minimal to average computing power. The devices are autonomous, cyber-physical objects capable of sensing, processing, storing and networking. Due to their connected nature, they are exposed to a huge number of threats and vulnerabilities. A new gateway to ensure anonymity in IoT networks using The Onion Router (TOR) hidden services in a Single-Board Computer (SBC) is proposed in this paper. IAEME Publication. -
House of sustainable waste management: An implementation framework
Manufacturing industries consume large amounts of natural resources as inputs to production in order to generate much lower amounts of useful products, leaving a major part of the inputs as by-products which are wastes. Waste disposal, in the present form, has significant adverse impacts on the environment as it can result in pollution of many forms. The present research critically examines the various revolutionary concepts of 'cradle to cradle (C2C)', 'design for green (DfG)', 'triple top line' and 'waste is food' as applied to industrial waste management. The exploratory study examines the prevailing practices and suggests approaches for sustainable industrial waste management. The paper proposes the 'house of sustainable waste management' which is a reference framework for industrial waste management which comprises three parts, 'the hierarchy', 'the pillars' and 'the foundations'. The proposed framework is conceptual in nature and provides a direction for implementation of sustainable industrial waste management. Copyright 2018 Inderscience Enterprises Ltd. -
The behaviour of macro and micro economic variables and the impact on systematic risk of non-banking finance companies
The reforms initiated by the Government of India during 1990s have brought fundamental changes in the structure and functioning of Banking and Non-Banking Institutions, their business models and the products and services offered by them. Global economic developments have altered the macro economic conditions of the respective nations and make the nations and their economies vulnerable to economic shocks in the form of systematic risk associated with their business activities. Macro-economic factors and micro economic factors have had effect on the risk level, assessing risk, measuring and managing risk has become paramount for Non-Banking financial Institutions. Individual influence of factors on the systematic risk as there is weak relationship with Beta but combined effect of factors is very positive on the systematic risk of the companies. Indian Institute of Finance. -
Identification of negative comments from positive sentences through data analysis
Social media has become a part, where people say what they think. It has made remarkable condition for individuals to impart their thoughts to the world. More consumers are writing their reviews which help people to make decisions about the quality and whether they should purchase the product. With respect to distinguishing perspectives out of this immense pool of conclusions, it turns into a laborious task and doing it physically is in every practical sense impossible. When we want to purchase things the best way to choose the finest product is to rely upon the opinions of others who already purchased those items. Sentiment analysis is utilized to choose whether the author's view is positive, negative, or neutral towards a specific item. This paper provides a review of apple mobile phone where we find polarity of a product based on scoring. We also worked on identifying negative comments in a positive sentence. We found the count of different polarity of words from overall positive feedbacks and stored the negative words so that we can identify which feature of the product is not acceptable and should be work with. We are representing our final result using wordcloud where we can detect which features has flaws. IAEME Publication. -
Shell script to clone AODV routing protocol in network Simulator-2
Background and Objective: Most of the research that are carried in ad hoc routing protocol is through simulation. While working with a simulator, the codes are enclosed in a component that is accessible to all the developers. The difficulty arises as there is no enough documentation and users find it difficult to modify different C++ and TCL files. Even if one component is modified then the entire Network Simulator-2 (NS-2) suite must be reconfigured. Cloning the protocol manually takes a lot of time and prone to error. Our objective is to ease the work of developers and researchers by showing the procedure to clone the AODV protocol automatically using a script. Methodology: In this study, a shell script is developed that will clone the AODV protocol by modifying 18 C++ and TCL files of the protocol and NS-2 suite by automatically inserting the code in exact files at exact position. It also configures the NS-2 and installs the entire NS-2 suite along with setting the path in .bash files. Results: In this research work, a comparison of cloned protocol with AODV protocol is done based on throughput time and packet loss metrics and the results generated are exactly same for both the protocols. The results of the study reveal that the proposed script clones the AODV protocol successfully. Conclusion: This work proves that the proposed script can clone the AODV protocol faster with just one execution of shell script. This methodology will save the time and help the developers or research to focus more on their study on the protocol. 2018 Authors. -
Facile synthesis of preformed mixed nano-carbon structure from low rank coal
Coal is a natural energy resource which is mainly used for energy production via combustion. Coal has nanocrystals embedded in it, formed during the coalification process, and is an ideal precursor for nano-carbon dots and diamonds. Herein, we report a facile top-down method to synthesise nanodots and diamonds of the size of 5 nm to 10 nm from three different types of coal by simple chemical leaching. TEM analysis revealed the formation of a mixture of carbon dots, graphene layers, and quantum dots in bituminous coal and sub-bituminous coal. Raman analysis confirmed the existence of synthesized nano-diamond and nano-carbon mixed phase with defects associated with it. It is concluded that graphene quantum dots, nano-diamonds, graphene sheets and carbon dots present in coal can be extracted by simple chemical treatment. These structures can be tuned to photoluminescent material for various optoelectronic applications or energy harvesting devices like super capacitors. 2018. This is an open access article distributed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. -
Nonlinear Gravitational and Radiation Aspects in Nanoliquid with Exponential Space Dependent Heat Source and Variable Viscosity
The nonlinear convective flow of kerosene-Alumina nanoliquid subjected to an exponential space dependent heat source and temperature dependent viscosity is investigated here. This study is focuses on augmentation of heat transport rate in liquid propellant rocket engine. The kerosene-Alumina nanoliquid is considered as the regenerative coolant. Aspects of radiation and viscous dissipation are also covered. Relevant nonlinear system is solved numerically via RK based shooting scheme. Diverse flow fields are computed and examined for distinct governing variables. We figured out that the nanoliquids temperature increased due to space dependent heat source and radiation aspects. The heat transfer rate is higher in case of changeable viscosity than constant viscosity. 2018, Springer Science+Business Media B.V., part of Springer Nature. -
Analysis of supervised and unsupervised technique for authentication dataset
Traditional methods of data storage vary from the present. These days data has become more unstructured and requires to be read contextually. Data Science provides a platform for the community to perform artificial intelligence and deep learning methodologies on large volumes of structured and unstructured data. In the era of artificial intelligence, AI is showing it's true potential by addressing social causes and automation in various industries such as automobile, medicine and smart buildings, healthcare, retail, banking, and finance service are some of the deliverables. From a variety of sources and flooding data, AI and machine learning are finding real-world adoption and applications. The nature of the data models is trial and error and is prone to change with their discoveries for the specific problem and this is the case with the different algorithms used. In this paper, we apply machine learning algorithms such as unsupervised learning k-means, bat k-means and supervised learning decision tree, k-NN, support vector machine, regression, discriminant analysis, ensemble classification for data set taken from UCI repository, phishing website, website phishing, Z- Alizadeh Sani and authentication datasets. Authentication dataset is generated for testing Single Sign-on which learns from data by training to make predictions. 2018Rahul K. Dubey, P. K. Nizar Banu. -
On the rainbow neighbourhood number of Mycielski type graphs
A rainbow neighbourhood of a graph G is the closed neighbourhood N[v] of a vertex v ? V (G) which contains at least one colored vertex of each color in the chromatic coloring C of G. Let G be a graph with a chromatic coloring C defined on it. The number of vertices in G yielding rainbow neighbourhoods is called the rainbow neighbourhood number of the graph G, denoted by rX(G). In this paper, we discuss the rainbow neighbourhood number of the Mycielski type graphs of graphs. 2018 Academic Publications. -
Determination of the size of the dust torus in H0507+164 through optical and infrared monitoring
The time delay between flux variations in different wavelength bands can be used to probe the inner regions of active galactic nuclei (AGNs). Here, we present the first measurements of the time delay between optical and near-infrared (NIR) flux variations in H0507+164, a nearby Seyfert 1.5 galaxy at z = 0.018. The observations in the optical V-band and NIR J, H, and Ks bands carried over 35 epochs during the period 2016 October to 2017 April were used to estimate the inner radius of the dusty torus. From a careful reduction and analysis of the data using cross-correlation techniques, we found delayed responses of the J, H, and Ks light curves to the V-band light curve. In the rest frame of the source, the lags between optical and NIR bands are found to be 27.1-12.0 +13.5 d (V versus J), 30.4-12.0 +13.9 d (V versus H) and 34.6-9.6 +12.1 d (V versus Ks). The lags between the optical and different NIR bands are thus consistent with each other. The measured lags indicate that the inner edge of dust torus is located at a distance of 0.029 pc from the central ultraviolet/optical AGN continuum. This is larger than the radius of the broad line region of this object determined from spectroscopic monitoring observations thereby supporting the unification model of AGN. The location of H0507+164 in the ?-MV plane indicates that our results are in excellent agreement with the now known lag-luminosity scaling relationship for dust in AGN. 2018 The Author(s). -
Facial pain expression recognition in real-time videos
Recognition of pain in patients who are incapable of expressing themselves allows for several possibilities of improved diagnosis and treatment. Despite the advancements that have already been made in this field, research is still lacking with respect to the detection of pain in live videos, especially under unfavourable conditions. To address this gap in existing research, the current study proposed a hybrid model that allowed for efficient pain recognition. The hybrid, which consisted of a combination of the Constrained Local Model (CLM), Active Appearance Model (AAM), and Patch-Based Model, was applied in conjunction with image algebra. This contributed to a system that enabled the successful detection of pain from a live stream, even with poor lighting and a low-resolution recording device. The final process and output allowed for memory for storage that was reduced up to 40%-55% and an improved processing time of 20%-25%. The experimental system met with success and was able to detect pain for the 22 analysed videos with an accuracy of 55.75%-100.00%. To increase the fidelity of the proposed technique, the hybrid model was tested on UNBC-McMaster Shoulder Pain Database as well. 2018 Pranti Dutta and Nachamai M. -
Prevalence and predictors of diabetes among adults in rural Dharwad, India: A cross-sectional study
Objective: Diabetes is a long life chronic non-communicable disease and emerging fast as one of the most serious health problems in developed and developing countries, also influences the risk of developing macrovascular complication including heart disease and stroke which are the leading causes of global death. This study aims to find the potential risk factors associated to diabetes among different community (Government, Private employees, and Businessmen) of adults 20 years and above. Methods: A cross-sectional study followed and conducted door-to-door survey using World Health Organization STEP Surveillance (WHO STEPS) questionnaire to collect the information of sociodemographic, anthropometric and behavioral characteristics. Multiple logistic regression is used to determine the risk factors of diabetes among study population. Data was pre-processed and used Chi-square test and t-test to find the comparison between the attributes. Results: Overall prevalence of diabetes is found to be 49.1% in which prevalence more in females with 51.7% than in males with 46.8%, the education, health examination, and waist circumference were found to be the potential risk factors. The total study subjects include 1083 in which male is 611 and female is 472. Conclusion: The current study reflects the importance of Diabetes disease among the study population in rural Dharwad and this study can be utilized to control and prevent diabetes. Its an early call for the females of the study population to take care and practice healthy food in day today life and the outcome of the study says that the education should be given prime importance in everyones life. 2018 The Authors. -
Segmentation and identification of MRI Brain segment in digital image
Brain image segmentation is important in the area of clinical diagnosis. MRI Brain image segmentation is time consuming and there is always a chance of occurrence of error when the segmentation is done manually. It is always possible to detect the infected tissues easily in the current medical field. However, the accuracy and the characteristics of abnormalities of the tissues are not precise. In the past, many researchers have identified the drawbacks of manual segmentation and hence proposed the semiautomatic and fully automatic segmentation methods in the field of medical imaging. The amount of precision about the detection of defective tissues leads to acceptance of a particular image segmentation method. In this article three segmentation methods are hybridized to get the optimum extraction of the region of interest (ROI) in brain MRI image. Further, the region properties of segment is extracted and stored as knowledgebase. The proposed algorithm integrates multiple segmentation methods and identifies the Brain Outer layer in MRI image. This identification AIDS medical experts for optimum diagnosis of defective tissues in the brain. IAEME Publication. -
Non-linear convection in chemically reacting fluid with an induced magnetic field across a vertical porous plate in the presence of heat source/sink
An investigation is carried out to observe the impacts of non-linear convection and induced magnetic field in the flow of viscous fluid over a porous plate under the influence of chemical reaction and heat source/sink. The plate is subjected to a regular free stream velocity as well as a suction velocity. The subjected non-linear problem is non-dimensionalized and analytic solutions are presented via perturbation method. The graphs are plotted to analyze the effect of relevant parameters on velocity, induced magnetic field, heat and mass transfer fields as well as friction factor, current density, Nusselt and Sherwood numbers. It is established that nonlinear convection aspect is destructive for thermal field and its layer thickness. The magnetic field effect enhances the thermal field while it reduces the velocity field. Also, the nonlinear effect subsides heat transfer rate significantly. 2018 Trans Tech Publications, Switzerland.